Behavioral task
behavioral1
Sample
0ed2c19bf4dcfced78aa721d58181760_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
0ed2c19bf4dcfced78aa721d58181760_JaffaCakes118
-
Size
180KB
-
MD5
0ed2c19bf4dcfced78aa721d58181760
-
SHA1
3982be58f39d6ba60c892df45eb33572919fcb57
-
SHA256
8ed41e2d1d25fd350177c5d38e497204948ee55854440e212c4eb40183a8a36a
-
SHA512
e2c672ea9d43bd5204d7abac0f3cbaa428a9f2f54d595865ca25bd9bb2823f6171db2dff7a8a87defdf3767376e3edcb1444aaff0b87011f82b5d57c002cd784
-
SSDEEP
3072:WMbI6WphZbXCdIEF36KLCn8h0DeXZCfbTh+AFIrP:lILXXCBBDLE8OQZubTh+AKr
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ed2c19bf4dcfced78aa721d58181760_JaffaCakes118
Files
-
0ed2c19bf4dcfced78aa721d58181760_JaffaCakes118.exe windows:4 windows x86 arch:x86
07890bb05eea9011563375b9d1c998e3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadConsoleOutputW
MapUserPhysicalPagesScatter
AddConsoleAliasA
GetConsoleTitleA
SetConsoleOS2OemFormat
SetConsoleFont
SetFileTime
GetPrivateProfileStructA
Process32Next
Process32First
WriteConsoleOutputA
WriteProfileSectionA
HeapDestroy
DosPathToSessionPathA
EscapeCommFunction
SetFileAttributesA
GlobalReAlloc
FreeUserPhysicalPages
GlobalCompact
ProcessIdToSessionId
GetFileInformationByHandle
lstrcmpA
ClearCommBreak
GetConsoleInputWaitHandle
WaitNamedPipeW
GetLogicalDriveStringsW
GetUserDefaultLangID
UnlockFileEx
RegisterConsoleOS2
CmdBatNotification
MoveFileExA
IsBadStringPtrW
GetCurrentDirectoryA
ExitProcess
HeapLock
UnregisterConsoleIME
VirtualAlloc
SetCommMask
GetProfileStringW
gdi32
GetMetaRgn
GdiEntry9
GetObjectType
SaveDC
GetTextCharset
XLATEOBJ_cGetPalette
GetWindowExtEx
GdiReleaseDC
CreateRoundRectRgn
ColorMatchToTarget
CreateHatchBrush
CreateEllipticRgnIndirect
GetTextExtentExPointI
EngAlphaBlend
DeleteDC
GetTextMetricsA
SetROP2
GetStockObject
GetRelAbs
GdiPlayPageEMF
ArcTo
SelectFontLocal
OffsetViewportOrgEx
DPtoLP
CopyMetaFileA
GdiGetSpoolMessage
GetCharWidthFloatW
GetROP2
ole32
OleIsRunning
OleSetMenuDescriptor
RevokeDragDrop
OleCreateLink
CLIPFORMAT_UserFree
OleRegEnumVerbs
OleQueryCreateFromData
HICON_UserMarshal
WdtpInterfacePointer_UserMarshal
OleCreateLinkFromDataEx
StgCreateDocfileOnILockBytes
DllGetClassObject
STGMEDIUM_UserUnmarshal
CoTaskMemFree
CoBuildVersion
FmtIdToPropStgName
HBITMAP_UserMarshal
CoAllowSetForegroundWindow
CoInvalidateRemoteMachineBindings
OleCreate
IsValidPtrIn
WdtpInterfacePointer_UserFree
CoCopyProxy
HGLOBAL_UserMarshal
PropVariantChangeType
FreePropVariantArray
GetErrorInfo
STGMEDIUM_UserMarshal
OleCreateEx
PropSysAllocString
ComPs_NdrDllGetClassObject
HBRUSH_UserUnmarshal
UtConvertDvtd32toDvtd16
CoGetComCatalog
OleCreateMenuDescriptor
OleGetIconOfFile
OleFlushClipboard
oleaut32
VarCyInt
VarUI4FromR4
VarAnd
VarCyFromBool
VarDiv
VarDecFromCy
GetErrorInfo
VarUI1FromDec
VarI1FromUI4
VarDateFromCy
VarI8FromI1
VarDateFromDec
VarUI8FromDate
SafeArrayCreateVector
Sections
UPX0 Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE